Check a list of websites if they have a specific cms installed and show their versions.
☆26Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for cms-checker
Users that are interested in cms-checker are comparing it to the libraries listed below
Sorting:
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Apache OfBiz Auth Bypass Scanner for CVE-2023-51467☆11Dec 31, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- ☆13Feb 14, 2022Updated 4 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Shared wordlists used for common subdomains , directory bruteforcing etc.☆10May 26, 2025Updated 9 months ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- ☆58Jun 28, 2020Updated 5 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- ☆14Feb 7, 2024Updated 2 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- A collection of scripts to extend Burp Suite☆142Apr 8, 2019Updated 6 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Private vulnerability testing suite☆13Mar 30, 2021Updated 4 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Jul 19, 2018Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- The program is designed to dump full memory of the process by specifing process name or process id.☆41Jul 29, 2019Updated 6 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- Check for .net padding oracle patch☆19Oct 4, 2018Updated 7 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- ☆46Apr 6, 2017Updated 8 years ago
- A toy implementation of 'Stack Guard' on top of the LLVM compiler toolchain☆23Jul 1, 2017Updated 8 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago